Static task
static1
Behavioral task
behavioral1
Sample
69347fad04b95d72add4c5787efcb09565064428eaefa11dd56d6a9b681e8705.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
69347fad04b95d72add4c5787efcb09565064428eaefa11dd56d6a9b681e8705.exe
Resource
win10v2004-20220812-en
General
-
Target
69347fad04b95d72add4c5787efcb09565064428eaefa11dd56d6a9b681e8705
-
Size
226KB
-
MD5
bab0c07e1da32862c41749bbed8ff257
-
SHA1
6cd032d801cf0e63672a818c1f6a551f1b6a4f84
-
SHA256
69347fad04b95d72add4c5787efcb09565064428eaefa11dd56d6a9b681e8705
-
SHA512
43ca96d7d37fa70af5c891dbb3b0fea0a70e3a1864069c85f36ba16c9f2fe44d469bf20b5a30711644cc1ad0b8fa045c64600b1d2a4c98f4f0928a4ca49318f0
-
SSDEEP
3072:nawxtssjSRaaZtRGSrU2i8nQyO/8NScUIazwJEYoFjtxc5+:nfxtbOPRBiMs/dwJEYoFjLc
Malware Config
Signatures
Files
-
69347fad04b95d72add4c5787efcb09565064428eaefa11dd56d6a9b681e8705.exe windows x86
573479dad684eb457a953528a2c569d4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
RegisterTraceGuidsW
StartTraceW
TraceEvent
LookupAccountSidA
LookupAccountSidW
OpenTraceW
ProcessTrace
CloseTrace
StopTraceW
kernel32
FindClose
FindNextFileW
FindFirstFileW
SetThreadLocale
GetSystemDefaultLCID
GetConsoleOutputCP
GetThreadLocale
GetUserDefaultUILanguage
LocalFree
WriteFile
WriteConsoleW
GetFileType
FormatMessageW
GetModuleHandleW
GetModuleFileNameW
ReadConsoleW
MultiByteToWideChar
ReadFile
SetConsoleMode
GetConsoleMode
CloseHandle
CreateFileW
SystemTimeToFileTime
FreeLibrary
LoadLibraryW
DeleteFileW
LockResource
LoadResource
FindResourceW
GetModuleHandleA
GetVersionExA
ExitProcess
GetProcAddress
GetACP
GetOEMCP
GetCPInfo
GetLastError
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
SetHandleCount
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
WideCharToMultiByte
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
LoadLibraryA
HeapReAlloc
SetFilePointer
GetLocaleInfoA
RtlUnwind
RaiseException
SetStdHandle
FlushFileBuffers
SetEndOfFile
Sleep
lstrlenA
FileTimeToLocalFileTime
FileTimeToSystemTime
SetLastError
GetStringTypeExW
GetLocaleInfoW
SetConsoleTextAttribute
GetStdHandle
GetConsoleScreenBufferInfo
GetProcessHeap
HeapAlloc
HeapFree
GetModuleFileNameA
SetEvent
lstrlenW
GetLocalTime
ExpandEnvironmentStringsW
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
user32
LoadStringW
CharToOemW
wsprintfW
rpcrt4
UuidCreate
ole32
CoCreateInstance
CoInitialize
CoSetProxyBlanket
oleaut32
SafeArrayUnaccessData
VariantClear
SysAllocString
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayAccessData
SysFreeString
SafeArrayGetElement
VariantInit
VariantChangeType
SafeArrayDestroy
ntdll
RtlLeaveCriticalSection
RtlDeleteCriticalSection
RtlInitializeCriticalSection
RtlFreeUnicodeString
RtlStringFromGUID
RtlEnterCriticalSection
RtlAnsiCharToUnicodeChar
Sections
.text Size: 115KB - Virtual size: 114KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 106KB - Virtual size: 106KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ